βΌ CVE-2021-41356 βΌ
π Read
via "National Vulnerability Database".
Windows Denial of Service Vulnerabilityπ Read
via "National Vulnerability Database".
βΌ CVE-2021-42323 βΌ
π Read
via "National Vulnerability Database".
Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42301.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31853 βΌ
π Read
via "National Vulnerability Database".
DLL Search Order Hijacking Vulnerability in McAfee Drive Encryption (MDE) prior to 7.3.0 HF2 (7.3.0.183) allows local users to execute arbitrary code and escalate privileges via execution from a compromised folder.π Read
via "National Vulnerability Database".
ποΈ Apache Storm maintainers patch two pre-auth RCE vulnerabilities ποΈ
π Read
via "The Daily Swig".
High-risk issues were discovered by GitHubβs in-house security teamπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Apache Storm maintainers patch two pre-auth RCE vulnerabilities
High-risk issues were discovered by GitHubβs in-house security team
βΌ CVE-2021-34598 βΌ
π Read
via "National Vulnerability Database".
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is activeπ Read
via "National Vulnerability Database".
βΌ CVE-2021-39474 βΌ
π Read
via "National Vulnerability Database".
Vulnerability in the product Docsis 3.0 UBC1319BA00 Router supported affected version 1319010201r009. The vulnerability allows an attacker with privileges and network access through the ping.cmd component to execute commands on the device.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43136 βΌ
π Read
via "National Vulnerability Database".
An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34582 βΌ
π Read
via "National Vulnerability Database".
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25974 βΌ
π Read
via "National Vulnerability Database".
In Publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS. A user with a Γ’β¬ΕpublisherΓ’β¬οΏ½ role is able to inject and execute arbitrary JavaScript code while creating a page/article.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25975 βΌ
π Read
via "National Vulnerability Database".
In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with Γ’β¬ΕpublisherΓ’β¬οΏ½ role to inject malicious JavaScript via the uploaded html file.π Read
via "National Vulnerability Database".
π΄ Dark Reading Video News Desk Comes to Black Hat Europe π΄
π Read
via "Dark Reading".
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.π Read
via "Dark Reading".
Dark Reading
Dark Reading Video News Desk Comes to Black Hat Europe
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.
ποΈ Black Hat Europe: Laws and regulations need to change to secure worldβs digital infrastructure ποΈ
π Read
via "The Daily Swig".
Better incentives to build secure products needed, former MEP tells conferenceπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Black Hat Europe: Laws and regulations need to change to secure worldβs digital infrastructure
Better incentives to build secure products needed, former MEP tells conference
β New Android Spyware Poses Pegasus-Like Threat β
π Read
via "Threat Post".
PhoneSpy already has stolen data and tracked the activity of targets in South Korea, disguising itself as legitimate lifestyle apps.π Read
via "Threat Post".
Threat Post
New Android Spyware Poses Pegasus-Like Threat
PhoneSpy already has stolen data and tracked the activity of targets in South Korea, disguising itself as legitimate lifestyle apps.
π΄ Researcher Details Vulnerabilities Found in AWS API Gateway π΄
π Read
via "Dark Reading".
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.π Read
via "Dark Reading".
Dark Reading
Researcher Details Vulnerabilities Found in AWS API Gateway
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.
π΄ 4 Tips to Secure the OT Cybersecurity Budget You Require π΄
π Read
via "Dark Reading".
OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.π Read
via "Dark Reading".
Dark Reading
4 Tips to Secure the OT Cybersecurity Budget You Require
OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.
π΄ Securing the Public: Who Should Take Charge? π΄
π Read
via "Dark Reading".
International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.π Read
via "Dark Reading".
Dark Reading
Securing the Public: Who Should Take Charge?
International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.
π¦Ώ How healthcare organizations and patients are increasingly at risk from cyber threats π¦Ώ
π Read
via "Tech Republic".
A majority of IT pros working at hospitals who were surveyed by Armis said they've seen a rise in cyber risk over the past 12 months.π Read
via "Tech Republic".
TechRepublic
How healthcare organizations and patients are increasingly at risk from cyber threats
A majority of IT pros working at hospitals who were surveyed by Armis said they've seen a rise in cyber risk over the past 12 months.
π΄ CISA and State and Local Partners Test Emergency Response Plans at Chevron Salt Lake Refinery π΄
π Read
via "Dark Reading".
The exercise included several objectives related to response procedures at the refinery, including evacuation and shelter-in-place decision-making; roles and responsibilities during investigations; communication with first responders; and public messaging before and following an incident.π Read
via "Dark Reading".
Dark Reading
CISA and State and Local Partners Test Emergency Response Plans at Chevron Salt Lake Refinery
The exercise included several objectives related to response procedures at the refinery, including evacuation and shelter-in-place decision-making; roles and responsibilities during investigations; communication with first responders; and public messagingβ¦
ποΈ Smuggling hidden backdoors into JavaScript with homoglyphs and invisible Unicode characters ποΈ
π Read
via "The Daily Swig".
Researchers urge developers to secure code by disallowing non-ASCII charactersπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Smuggling hidden backdoors into JavaScript with homoglyphs and invisible Unicode characters
Researchers urge developers to secure code by disallowing non-ASCII characters
β Massive Zero Day Hole Found in Palo Alto Security Appliances β
π Read
via "Threat Post".
Researchers have a working exploit for the vulnerability (now patched), which allows for unauthenticated RCE and affects an estimated 70,000+ VPN/firewalls.π Read
via "Threat Post".
Threat Post
Massive Zero-Day Hole Found in Palo Alto Security Appliances
Researchers have a working exploit for the vulnerability (now patched), which allows for unauthenticated RCE and affects an estimated 70,000+ VPN/firewalls.
β Sophos 2022 Threat Report: Malware, Mobile, Machine learning and more! β
π Read
via "Naked Security".
The crooks have shown that they're willing to learn and adapt their attacks, so we need to make sure we learn and adapt, too.π Read
via "Naked Security".
Naked Security
Sophos 2022 Threat Report: Malware, Mobile, Machine learning and more!
The crooks have shown that theyβre willing to learn and adapt their attacks, so we need to make sure we learn and adapt, too.